Search for Well Architected Advice
< All Topics
Print

Identify and prioritize risks using a threat model

Performing threat modeling allows you to identify and maintain an up-to-date register of potential threats and associated mitigations for your workload. By prioritizing these threats, you can adapt your security controls to prevent, detect, and respond to incidents. Regularly revisiting and updating the threat model ensures that it remains relevant to your workload and the evolving security landscape.

  1. Develop a threat model: Begin by identifying the most critical assets and potential attack vectors within your workload. Use frameworks like STRIDE or MITRE ATT&CK to guide the threat identification process, ensuring comprehensive coverage of all risk areas.
  2. Prioritize identified threats: Based on potential impact and likelihood, categorize threats to determine which require immediate attention. Focus on addressing high-priority risks that could have the most significant impact on your workload’s security and business continuity.
  3. Apply and update security controls: Implement preventive, detective, and responsive security controls based on the identified risks. Ensure that controls are regularly tested and adjusted as threats evolve or new vulnerabilities are discovered.
  4. Revisit and maintain the threat model: Continuously update the threat model as the workload evolves or as new information about threats becomes available. Regular threat model reviews ensure your mitigations remain effective against emerging security risks.
  5. Adapt to the evolving security landscape: Stay informed of new security threats and trends by consuming threat intelligence and industry updates. Incorporate this information into your threat model and adjust security controls accordingly.

Supporting Questions:

  • How is the threat model developed and maintained for your workload?
  • What process do you follow to prioritize risks based on their impact and likelihood?
  • How are security controls adjusted based on updates to the threat model?

Roles and Responsibilities:

Security Architect:

  • Responsibilities:
    • Develop and maintain the threat model for the workload.
    • Identify potential attack vectors and assess the impact and likelihood of threats.
    • Ensure security controls are updated based on evolving threats.

Risk Manager:

  • Responsibilities:
    • Prioritize threats based on business impact and risk appetite.
    • Collaborate with security teams to ensure risk mitigations are in place and effective.
    • Review and adjust the threat model as the workload or external threat landscape changes.

Artefacts:

  • Threat Model Documentation: Detailed records of identified threats, their likelihood, potential impact, and associated mitigations.
  • Risk Register: A prioritized list of identified risks and corresponding control measures for monitoring and management.
  • Security Control Testing Reports: Evidence of regular testing and validation of security controls based on updated threat models.
Table of Contents